Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)

COMPUTATIONAL IMAGING FOR SECURE AUTHENTICATION AND ENCRYPTION This pioneering approach merges Fourier ghost imaging, deep learning, and computational holography to improve data access control and reinforce physical security measures. The integration of these advanced techniques demonstrates the pot...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Laser & photonics reviews 2024-06, Vol.18 (6), p.n/a
Hauptverfasser: Wang, Xiaogang, Zhou, Qingming, Zhang, Lin, Xue, Jidong, Xu, Bijun, Yu, Xinning, Wang, Sheng, Zhang, Zhenyu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page n/a
container_issue 6
container_start_page
container_title Laser & photonics reviews
container_volume 18
creator Wang, Xiaogang
Zhou, Qingming
Zhang, Lin
Xue, Jidong
Xu, Bijun
Yu, Xinning
Wang, Sheng
Zhang, Zhenyu
description COMPUTATIONAL IMAGING FOR SECURE AUTHENTICATION AND ENCRYPTION This pioneering approach merges Fourier ghost imaging, deep learning, and computational holography to improve data access control and reinforce physical security measures. The integration of these advanced techniques demonstrates the potential impact of computational imaging in advancing security protocols, as outlined by Xiaogang Wang and co‐workers in article 2300820.
doi_str_mv 10.1002/lpor.202470037
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3065661548</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3065661548</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1577-4a03c790c2cdeec08182c2de18ba49045839c035c08c01257bf7239c559aa6733</originalsourceid><addsrcrecordid>eNqFUM9PwjAUbowmInr13MQLHDZet3XrjoSgkCyBoJ6XUspWMtbZbpLd_NPdxODRd3m_vu_Lex9CjwRcAuBNikob1wMviAD86AoNCAt9h7E4vr7UDG7RnbUHANpFOEBfM32smprXSpe8wMsjz1SZ4XkpTFv1Q3xSdY45fq1lxkudGV7lSmBe7vBCF5d-2tS5LGslfpQ6tOEdocWjhFtp8DrXtS6VsHgjP11M2CgcT_pbx_foZs8LKx9-8xC9P8_fZgsnWb0sZ9PEEYRGkRNw8EUUg_DETkoBjDBPeDtJ2JYHMQSU-bEAn3YbAcSj0XYfed2I0pjzMPL9IXo661ZGfzTS1ulBN6b72aY-hDQMCQ1Yh3LPKGG0tUbu08qoIzdtSiDtXU57l9OLyx0hPhNOqpDtP-g0Wa82f9xv4faAvg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3065661548</pqid></control><display><type>article</type><title>Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)</title><source>Wiley Online Library Journals Frontfile Complete</source><creator>Wang, Xiaogang ; Zhou, Qingming ; Zhang, Lin ; Xue, Jidong ; Xu, Bijun ; Yu, Xinning ; Wang, Sheng ; Zhang, Zhenyu</creator><creatorcontrib>Wang, Xiaogang ; Zhou, Qingming ; Zhang, Lin ; Xue, Jidong ; Xu, Bijun ; Yu, Xinning ; Wang, Sheng ; Zhang, Zhenyu</creatorcontrib><description>COMPUTATIONAL IMAGING FOR SECURE AUTHENTICATION AND ENCRYPTION This pioneering approach merges Fourier ghost imaging, deep learning, and computational holography to improve data access control and reinforce physical security measures. The integration of these advanced techniques demonstrates the potential impact of computational imaging in advancing security protocols, as outlined by Xiaogang Wang and co‐workers in article 2300820.</description><identifier>ISSN: 1863-8880</identifier><identifier>EISSN: 1863-8899</identifier><identifier>DOI: 10.1002/lpor.202470037</identifier><language>eng</language><publisher>Weinheim: Wiley Subscription Services, Inc</publisher><subject>Access control ; Authentication ; Holography ; Imaging ; Security ; Steganography</subject><ispartof>Laser &amp; photonics reviews, 2024-06, Vol.18 (6), p.n/a</ispartof><rights>2024 Wiley‐VCH GmbH</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Flpor.202470037$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Flpor.202470037$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,777,781,1412,27905,27906,45555,45556</link.rule.ids></links><search><creatorcontrib>Wang, Xiaogang</creatorcontrib><creatorcontrib>Zhou, Qingming</creatorcontrib><creatorcontrib>Zhang, Lin</creatorcontrib><creatorcontrib>Xue, Jidong</creatorcontrib><creatorcontrib>Xu, Bijun</creatorcontrib><creatorcontrib>Yu, Xinning</creatorcontrib><creatorcontrib>Wang, Sheng</creatorcontrib><creatorcontrib>Zhang, Zhenyu</creatorcontrib><title>Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)</title><title>Laser &amp; photonics reviews</title><description>COMPUTATIONAL IMAGING FOR SECURE AUTHENTICATION AND ENCRYPTION This pioneering approach merges Fourier ghost imaging, deep learning, and computational holography to improve data access control and reinforce physical security measures. The integration of these advanced techniques demonstrates the potential impact of computational imaging in advancing security protocols, as outlined by Xiaogang Wang and co‐workers in article 2300820.</description><subject>Access control</subject><subject>Authentication</subject><subject>Holography</subject><subject>Imaging</subject><subject>Security</subject><subject>Steganography</subject><issn>1863-8880</issn><issn>1863-8899</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNqFUM9PwjAUbowmInr13MQLHDZet3XrjoSgkCyBoJ6XUspWMtbZbpLd_NPdxODRd3m_vu_Lex9CjwRcAuBNikob1wMviAD86AoNCAt9h7E4vr7UDG7RnbUHANpFOEBfM32smprXSpe8wMsjz1SZ4XkpTFv1Q3xSdY45fq1lxkudGV7lSmBe7vBCF5d-2tS5LGslfpQ6tOEdocWjhFtp8DrXtS6VsHgjP11M2CgcT_pbx_foZs8LKx9-8xC9P8_fZgsnWb0sZ9PEEYRGkRNw8EUUg_DETkoBjDBPeDtJ2JYHMQSU-bEAn3YbAcSj0XYfed2I0pjzMPL9IXo661ZGfzTS1ulBN6b72aY-hDQMCQ1Yh3LPKGG0tUbu08qoIzdtSiDtXU57l9OLyx0hPhNOqpDtP-g0Wa82f9xv4faAvg</recordid><startdate>202406</startdate><enddate>202406</enddate><creator>Wang, Xiaogang</creator><creator>Zhou, Qingming</creator><creator>Zhang, Lin</creator><creator>Xue, Jidong</creator><creator>Xu, Bijun</creator><creator>Yu, Xinning</creator><creator>Wang, Sheng</creator><creator>Zhang, Zhenyu</creator><general>Wiley Subscription Services, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>L7M</scope></search><sort><creationdate>202406</creationdate><title>Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)</title><author>Wang, Xiaogang ; Zhou, Qingming ; Zhang, Lin ; Xue, Jidong ; Xu, Bijun ; Yu, Xinning ; Wang, Sheng ; Zhang, Zhenyu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1577-4a03c790c2cdeec08182c2de18ba49045839c035c08c01257bf7239c559aa6733</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Access control</topic><topic>Authentication</topic><topic>Holography</topic><topic>Imaging</topic><topic>Security</topic><topic>Steganography</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, Xiaogang</creatorcontrib><creatorcontrib>Zhou, Qingming</creatorcontrib><creatorcontrib>Zhang, Lin</creatorcontrib><creatorcontrib>Xue, Jidong</creatorcontrib><creatorcontrib>Xu, Bijun</creatorcontrib><creatorcontrib>Yu, Xinning</creatorcontrib><creatorcontrib>Wang, Sheng</creatorcontrib><creatorcontrib>Zhang, Zhenyu</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Laser &amp; photonics reviews</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, Xiaogang</au><au>Zhou, Qingming</au><au>Zhang, Lin</au><au>Xue, Jidong</au><au>Xu, Bijun</au><au>Yu, Xinning</au><au>Wang, Sheng</au><au>Zhang, Zhenyu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)</atitle><jtitle>Laser &amp; photonics reviews</jtitle><date>2024-06</date><risdate>2024</risdate><volume>18</volume><issue>6</issue><epage>n/a</epage><issn>1863-8880</issn><eissn>1863-8899</eissn><abstract>COMPUTATIONAL IMAGING FOR SECURE AUTHENTICATION AND ENCRYPTION This pioneering approach merges Fourier ghost imaging, deep learning, and computational holography to improve data access control and reinforce physical security measures. The integration of these advanced techniques demonstrates the potential impact of computational imaging in advancing security protocols, as outlined by Xiaogang Wang and co‐workers in article 2300820.</abstract><cop>Weinheim</cop><pub>Wiley Subscription Services, Inc</pub><doi>10.1002/lpor.202470037</doi><tpages>1</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1863-8880
ispartof Laser & photonics reviews, 2024-06, Vol.18 (6), p.n/a
issn 1863-8880
1863-8899
language eng
recordid cdi_proquest_journals_3065661548
source Wiley Online Library Journals Frontfile Complete
subjects Access control
Authentication
Holography
Imaging
Security
Steganography
title Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy (Laser Photonics Rev. 18(6)/2024)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T19%3A54%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Computational%20Imaging%20Encryption%20with%20a%20Steganographic%20and%20Holographic%20Authentication%20Strategy%20(Laser%20Photonics%20Rev.%2018(6)/2024)&rft.jtitle=Laser%20&%20photonics%20reviews&rft.au=Wang,%20Xiaogang&rft.date=2024-06&rft.volume=18&rft.issue=6&rft.epage=n/a&rft.issn=1863-8880&rft.eissn=1863-8899&rft_id=info:doi/10.1002/lpor.202470037&rft_dat=%3Cproquest_cross%3E3065661548%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3065661548&rft_id=info:pmid/&rfr_iscdi=true